Essential Bluetooth hacking tools

Security-Hacks has a great roundup of essential Bluetooth hacking tools. As they point out, Bluetooth technology is very useful for communication with mobile devices. However, it is also vulnerable to privacy and security invasions. Learning the ins and outs of these tools will allow you to familiarize yourself with Bluetooth vulnerabilities and strengths, and enable you to protect yourself from attackers. The list is separated into two parts – tools to detect Bluetooth devices, and tools to hack into Bluetooth devices. Check out BlueScanner, which will detect Bluetooth-enabled devices, and will extract as much information as possible from those devices. Other great tools to explore include BTCrawler, which scans for Windows Mobile devices, or Bluediving, which is a Bluetooth penetration suite, and offers some unique features like the ability to spoof Bluetooth addresses, and an L2CAP packet generator. Most of the tools are available for use with Linux platforms, but there are a few you can also use with Windows.

[via Digg]

Comments

  1. Chris says:

    Attention: Due to a change in the German Law against Cybercrime (§202c StGB) I can no longer offer this software and any infmormation about how to use it. I will no longer answer mails regardings this tool. Sorry folks :-(

    Oh well

  2. obsidian says:

    Yes, it’s nearly always Linux these days with wireless security stuff. It probably needs the open-ness right down to the driver level. A good change in my eyes.

  3. Ken says:

    That sucks, chris :(

    When you outlaw security information only outlaws will have access to security information!

  4. jeicrash says:

    These tools have been part of the Auditor 2 toolset for years. I am surprised it has just now reached hack-a-day. BT was a good idea, but the security codes for it are a joke.

    And don’t worry just because germany changed some laws someone else somewhere else could always pick up the project.

  5. Rimwulfrandall says:

    You know I herd about that there’s a loop hole from what I was lead to believe. You can port all your stuff name and all to a another host off shore like here in the US or AU or CA a far as I know these countries don’t have any law agents the information the US by fact doesn’t.
    And from what I keep hearing that law and from what I read It doesn’t prevent you from viewing the stuff just the distribution of such info.

    Please. Let me know if I am wrong. and also add proof.

  6. gadget gyan says:

    Do you know any company who is creating or using bluetooth technology to charge electronic devices wirelessly?

  7. irazza says:

    http://wiki.thc.org/BlueMaho

    BlueMaho Project – Bluetooth Security Testing Suite

    look here!

  8. tel niasa says:

    everyone has the right to freedom of opinion and expression, this right
    includes the freedom to hold opinions without interference, and to seek,
    receive and impart information through any media and regardless of
    frontiers.
    go and read the universal declaration of human rights at
    un.org/en/documents/udhr especially the bit about rebelling against tyranny and oppression!

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Follow

Get every new post delivered to your Inbox.

Join 96,557 other followers